6 day wireless pentesting class from SANS, with one day focused on RFID, Smart Cards, and NFC Hacking: https://www.sans.org/event/network-security-2017/course/wireless-penetration-testing-ethical-hacking
Physical Security Specialist – SANS Class
6 day class from the CORE Group via SANS covering various physical security topics, including electronic door access: https://www.sans.org/course/physical-security-specialist-full-comprehensive-edition
RFID Hacking with The Proxmark 3 – Kevin Chung 2017
A solid tutorial going over several card examples: https://blog.kchung.co/rfid-hacking-with-the-proxmark-3/
RFID Security Workshop – PHDays III 2013
Fun with Proxmark3 – RSA 2014
RDV2 Unboxing Video – Lab401
Iceman’s proxmark firmware
Iceman’s fork is a GitHub repository forked from Proxmark3. It is a customer firmware which can be loaded onto the Proxmark3, expanding its capabilities. Please note that his repository is highly experimental. Many changes from forks of Proxmark3 on GitHub eventually get added to the master Proxmark3 repository, however Iceman’s fork includes some unique features including:
- Support for TOPAZ RFID – Reading, sniffing, simulating.
- A brute-forcer for AWID RIFDs.
- A brute-forcer for HID RFIDs.
- Enhancements to MIFARE Ultralight:
- hf mfu pwdgen Generate a password from known algorithm
- hf mfu eload Load Ultralight .eml dump file into emulator memory
- hf mfu sim Simulate Ultralight from emulator memory
- Enhancements to T55XX:
- lf t55xx recoverpw Tries to recover a bad password write from a cloner.
- RevEng 1.44 – for CRC calculations.
- Firmware for low-frequency standalone mode
- As well as many other bug fixes, patches, and scripts.
Iceman’s fork can be downloaded from GitHub here: https://github.com/iceman1001/proxmark3
Official Firmware repo
The official proxmark3 firmware can be found on their github repo: https://github.com/Proxmark/proxmark3
Mifare Cheat Sheet
Nice quick cheat sheet on dealing with Mifare cards: https://github.com/Proxmark/proxmark3/wiki/Mifare-HowTo
First post!
Yay new site.